4.6 Article

Image Encryption and Authentication With Elliptic Curve Cryptography and Multidimensional Chaotic Maps

Journal

IEEE ACCESS
Volume 9, Issue -, Pages 76191-76204

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/ACCESS.2021.3072075

Keywords

Encryption; Cats; Elliptic curves; Computational modeling; Chaotic communication; Three-dimensional displays; Color; Arnold cat map; chaotic map; digital signature; elliptic curve cryptography; image encryption

Ask authors/readers for more resources

This paper presents a robust elliptic curve-based image encryption and authentication model, incorporating various techniques to protect the confidentiality and integrity of images. The model ensures image quality with low computational costs, and exhibits high resilience against various attacks.
Many researchers have used the properties of the popular Elliptic Curve Cryptography(ECC) to devise a stronger and faster image encryption algorithm to assure the secrecy of images during online transmission. In this paper, a robust Elliptic curve based image encryption and authentication model for both grayscale and color images has been proposed. The model uses the secure Elliptic Curve Diffie-Hellman(ECDH) key exchange to compute a shared session key along with the improved ElGamal encoding scheme. 3D and 4D Arnold Cat maps are used to effectively scramble and transform the values of plain image pixels. A well-structured digital signature is used to verify the authenticity of the encrypted image prior to decryption. The model produces good-quality cipher images with an average entropy of 7.9993 for grayscale and 7.99925 for the individual components of color images. The model has high average NPCR of 99.6%, average UACI of 33.3% and low correlation for both grayscale and color images. The model has low computational costs with minimized point multiplication operations. The proposed model is robust with high resilience against statistical, differential, chosen-plaintext(CPA), known-plaintext(KPA) and occlusion attacks.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available